• Vendor

  • Practical Application of Service Level & Supplier Management

    Many people completing the ITIL 4 Foundation course ask where they can go next to gain insight, assistance, and tools to enable the practical application of the ITIL practices in their real environment. This set of Practical Application courses are designed to meet that demand. In these courses attendees/learners will spend two days with an instructor talking through the practical application and delivery of a specific practice. This course is focussed upon Service Level & Supplier Management. Whether in a

    Submit an Inquiry
  • Practical Data Science with Amazon SageMaker

    1 day
    In this course, you will learn how to: Apply Amazon SageMaker to a specific use case and dataset Practice all the steps of the typical data science process Visualize and understand the dataset Explore how the attributes of the dataset relate to each other Prepare the dataset for training Use built-in algorithms.

    Submit an Inquiry
  • Prep.Sec. and compliance to support Microsoft 365 Copilot

    1 day
    The MS-4002: Prepare Security and Compliance to Support Microsoft 365 Copilot course provides a detailed understanding of how to secure and protect Microsoft 365 environments to support the use of Microsoft Copilot. Participants will learn how to manage user access, implement app and endpoint protection, deploy Microsoft Defender for Office 365, and enforce data retention and information barriers. The course also covers advanced data protection techniques, such as data loss prevention (DLP) and sensitivity

    Submit an Inquiry
  • Python Security

    3 days
    The Python language is used in many different settings – from command-line tools to complex Web applications. Many of these Python programs are exposed to attack, either by being directly accessible through the Internet or by directly processing user-provided data in a server environment. Developers must therefore be extremely cautious in how to use different technologies securely, and should also have a deep understanding in secure coding techniques and potential pitfalls.

    Submit an Inquiry
  • Quantum Communication

    3 days
    As the field of quantum communication continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents. The course covers the fundamental concepts of quantum communication, including the properties of qubits and quantum registers, the manipulation of quantum states through quantum gates, and the principles and implementations of quantum key distribution.

    Submit an Inquiry
  • Quantum Computing Fundamentals

    3 days
    As the field of quantum computing continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents. This comprehensive course is designed to provide participants with a thorough understanding of the fundamental principles and practical applications of quantum computing.

    Submit an Inquiry
  • Running Container-Enabled Microservices on AWS

    1 day
    This course teaches you how to: • Design a microservices-based architecture that uses containers. • Use Amazon ECS to run and scale a microservices-based application. • Integrate Amazon ECS with other AWS services. Intended Audience

    Submit an Inquiry
  • Running Containers on Amazon Elastic Kubernetes Service

    3 days
    In this course, you will learn to: Review and examine containers, Kubernetes and Amazon EKS fundamentals and the impact of containers on workflows. Build an Amazon EKS cluster by selecting the correct compute resources to support worker nodes. Secure your environment with AWS Identity and Access Management (IAM) authentication by creating an Amazon EKS service role for your cluster Deploy an application on the cluster.

    Submit an Inquiry
  • Secure Coding in PHP

    3 Days
    The course provides essential skills for PHP developers necessary to make their applications resistant to contemporary attacks through the Internet.

    Submit an Inquiry
  • Secure Coding Master Course for Banking and Finance

    5 Days
    <i>“Money makes the world go round....” </i>– remember? And yes: it is your responsibility to secure all that. As a fintech company you have to take up the challenge, and beat the bad guys with bomb-proof, secure applications! If there is a domain where security is critical, it is definitely fintech. Vulnerability is not an option if you want to stay a trusted and reliable vendor with systems and applications that certainly comply with PCI-DSS requirements.

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025